Threats to Data and Information Flashcards

1
Q

any potential danger to information or systems.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

subject to serious threats that can have adverse effects on organizational operations (including missions, functions, image, or reputation), organizational assets, individuals, other organizations, and the government by compromising the confidentiality, integrity, or availability of information being processed, stored, or transmitted by those systems.

A

information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threats to information systems include

A

environmental disruptions,

human errors

purposeful attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Additional threats arise in the

A

system acquisition and code distribution processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Serious security problems have also resulted from

A

discarded or stolen systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It refers to the capability of an adversary coupled with his/her intentions to undertake any actions detrimental to the success of program activities or operations.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a natural or man-made occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a potential cause of an unwanted incident, which may result in harm to a system or organization.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It refers to any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is also any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It also refers any circumstance or event with the potential to adversely impact organizational operations, organizational assets, individuals, other organizations, or the Nation through a system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it also refers to any circumstance or event with the potential to intentionally or unintentionally exploit one or more vulnerabilities in a system resulting in a loss of confidentiality, integrity, or availability.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is a potential cause of an incident, that may result in harm of systems and organization.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It is a potential undesirable event, malicious or not, of:

A

compromise
corruption
denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

e., theft of valuable or sensitive information or services),

A

compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

degradation/blocking of data, processing, or communications or an entity possessing the capability and intent to cause the above.

A

denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is any circumstance or event with the potential to adversely impact the essential clinical performance of the device, organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, or other organizations through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A

medical device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threats exercise vulnerabilities, which may impact the essential clinical performance of the device.

A

medical device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It is an intentional or unintentional potential event that could compromise the security and integrity of the system.

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

measurement and statistical analysis of people’s unique physical and behavioral characteristics.

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Threats are implemented by

A

threat agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is also called a threat actor.

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It refers to any person or thing that acts (or has the power to act) to cause, carry, transmit, or support a threat.

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

It also refers to an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

It is a system entity that performs a threat action, or an event that results in a threat action.

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

examples of threat agent

A

an intruder network through a port on the firewall
a process accessing data in a way that violates the security policy
insiders (including system administrators and developers)
malicious hackers
an employee making an unintentional mistake that could expose confidential information or destroy a file’s integrity
a tornado wiping out a facility
organized crime
terrorists
nation states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

It is about keeping data safe and affects anyone relying on a computer system

A

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

If the data on a computer system is damaged, lost, or stolen, it can lead to disaster.

A

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

6
keeping data secure

A

backup files
antivirus
log off after use
authorized personnel
passwords
safe file storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

6 key threat to data security

A

corrupted
hacked
lost
destroyed
deleted
damaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

10 Technical Data Threats

A

hacking
advance persistent threats
malware
misuse
mobile devices

cloud computing
cracking
data leakage
errors

third parties/ service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

6 non technical vulnerabilities

A

physical
insider threat
environmental

dumpster diving
social engineering
social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

refers to an unauthorized user gaining access to a computer or a network

A

hacking

34
Q

a multi-billion dollar industry for cybercriminals and provides opportunities to extract data for political and monetary gains.

A

hacking

35
Q

trying to get into computer systems in order to steal, corrupt, or illegitimately view data.

A

cracking

36
Q

technique used to breach computer software or an entire computer security system, and with malicious intent.

A

cracking

37
Q

strictly used in a criminal sense (i.e., It is hacking but evil).

A

cracking

38
Q

reverse engineering of software, passwords or encryption, that could lead to unauthorized access to sensitive information.

A

cracking

39
Q

disrupts computer operations, gathers sensitive information, or gains access to a computer system to compromise data and information.

A

malware

40
Q

used to keep malware off of computers.

A

antivirus software
firewalls

41
Q

examples of malware

A

viruses,
worms,
spyware,
ransomware,
keyloggers and
backdoors,
but in reality malware can be any program that operates against the requirements of the computer user.

42
Q

Employees may take advantage of entrusted resources or privileges for a malicious or unintended purpose.

A

misuse

43
Q

Included in this category are administrative abuse, policy violations, and use of non-approved assets.

A

misuse

44
Q

system misconfigurations or programming errors can cause unauthorized access by cybercriminals.

A

errors

45
Q

can occur in-house due to faulty programming, or hackers can find loopholes that can cause errors as well.

A

errors

46
Q

Unauthorized electronic or physical transmission of data or information from within a company to an external destination or recipient could leave data in the wrong hands.

A

data leakage

47
Q

Storing unencrypted sensitive data with lax access controls leaves data stored in the cloud vulnerable to improper disclosure.

A

cloud computing

48
Q

With the growing amount of organizations and people using cloud computers, it is more important now than ever before to protect your information against hackers.

A

cloud computing

49
Q

carrying sensitive data can be lost or stolen, possibly causing data to fall into the wrong hands.

A

mobile devices

50
Q

are structured cyberattacks to extort or damage companies whose websites or online assets are a major source of revenue.

A

availability attacks

51
Q

a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time.

A

Advanced Persistent Threats (APT)

52
Q

uses continuous and sophisticated hacking techniques to gain access to a system and remain inside for a prolonged and potentially destructive period of time.

A

APT

53
Q

Hackers attack computer systems while avoiding detection and harvesting valuable information over a long period of time.

A

APT

54
Q

Theft, tampering, snooping, sabotage, vandalism, local device access, and assault can lead to a loss of data or information.

A

Physical

55
Q

Natural events such as tornadoes, power loss, fires, and floods pose hazards to the infrastructure in which data assets are located.

A

environmental

56
Q

Employees, contractors, or partners can commit fraud, espionage or theft of intellectual property.

A

insider threat

57
Q

Employees often fall victim to scams or reveal information not intended for public knowledge on social media.

A

social media

58
Q

Improper disposal of sensitive data could lead to improper disclosures of sensitive information just sitting in trash bins.

A

dumpster diving

59
Q

Having internal procedures when disposing of sensitive documents is crucial in preventing this kind of a non-technical vulnerability.

A

dumpster diving

60
Q

Attackers rely heavily on human interaction to gain access to company networks or systems, usually tricking users into breaking normal security procedures and revealing their account credentials.

A

social engineering

61
Q

It is the art of manipulating people so they give up confidential information.

A

social engineering

62
Q

10 Types of Information Security Threats for IT teams to know about

A

botnets
exploit kits
drive-by download attacks

distributed denial-of-service attacks
insider threats
viruses and worms
advanced persistent threat attacks

phishing attacks
ransomware
malvertising

63
Q

It is a malicious act that aims to corrupt or steal data or disrupt an organization’s systems or the entire organization.

A

security threat

64
Q

It refers to an occurrence during which company data or its network may have been exposed.

A

security event

65
Q

It is an event that results in a data or network breach.

A

security incident

66
Q

occurs when individuals close to an organization who have authorized access to its network intentionally or unintentionally misuse that access to negatively affect the organization’s critical data or systems.

A

insider threat

67
Q

Careless employees who do not comply with their organizations’ business rules and policies

A

insider threat

68
Q

source of insider threat

A

contractors
business partners
third party vendors

69
Q

(malware) aimed at destroying an organization’s systems, data and network.

A

viruses and worms

70
Q

is a malicious code that replicates by copying itself to another program, system or host file.

A

computer virus

71
Q

s a self-replicating program that doesn’t have to copy itself to a host program or require human interaction to spread.

A

computer worm

72
Q

collection of Internet-connected devices, including PCs, mobile devices, servers and IoT devices that are infected and remotely controlled by a common type of malware.

A

botnet

73
Q

malicious code is downloaded from a website via a browser, application or integrated operating system without a user’s permission or knowledge.

A

drive-by-download attacks

74
Q

type of information security threat that employs social engineering to trick users into breaking normal security practices and giving up confidential information, including names, addresses, login credentials, Social Security numbers, credit card information and other financial information.

A

phishing attacks

75
Q

multiple compromised machines attack a target, such as a server, website or other network resource, making the target totally inoperable.

A

DDoS attacks

76
Q

the victim’s computer is locked, typically by encryption, which keeps the victim from using the device or data that are stored on it.

A

ransomware

77
Q

programming tool that enables a person without any experience writing software code to create, customize and distribute malware.

A

exploit kit

78
Q

a targeted cyberattack in which an unauthorized intruder penetrates a network and remains undetected for an extended period of time.

A

advanced persistent threat attacks

79
Q

technique cybercriminals use to inject malicious code into legitimate online advertising networks and web pages.

A

malvertising

80
Q

This code typically redirects users to malicious websites or installs malware on their computers or mobile devices.

A

malvertising